Republic of the Philippines
Department of Education
Region I
Schools Division of Ilocos Norte
PASALENG NATIONAL HIGH SCHOOL
Pasaleng, Pagudpud, Ilocos Norte // 300026@deped.gov.ph
2nd PERIODICAL EXAMINATION
MEDIA AND INFORMATION LITERACY
DIRECTIONS: Read and understand each item carefully. Shade the circle corresponding to the letter of your choice in the answer
sheet provided. Refer to the format below when shading the circle.
1. It took effect on January 1, 1998, and by its express provision, repealed the Trademark Law, the Patent Law, Article 188 and 189
of the Revised Penal Code, the Decree on Intellectual Property, and the Decree on compulsory Reprinting of Foreign Textbooks.
a. Civil code of the Philippines c. Revised penal code of the Philippines
b. Trademark code of the Philippines d. Intellectual property code of the Philippines
2. What does a trademark protect?
a. Inventions c. Secret formula
b. Logos and names d. Work of art
3. This refers to the limitation and to the prerogative granted by copyright law to the author of an ingenious work, samples of use
embrace statement, search engines, criticism, news coverage, research, teaching, library archiving and scholarship.
a. Addiction b. Copyright c. Fair use d. Plagiarism
4. Homer Simpson invents a hammer that hammers nails into a wall with the press of one button and without any further human
intervention. As Homer is preparing his patent application, Flanders invents the same device independently. Flanders then begins
marketing the device. Can Homer sue to enjoin Flanders from marketing the hammer?
a. Yes, because the device was made using trade secrets of Homer's.
b. Yes, because Homer's device was protected automatically by a patent.
c. No, because Homer's device was protected automatically by a trademark.
d. No, because Homer has not filed for his patent.
5. Mikey, a new sneaker manufacturer, uses a swoosh as its logo that looks similar to the one used by its competitor, Nike, for the
past several decades. However, Mikey's "swoosh" is slightly narrower and is blue instead of white. Nike sues and asks a court
to enjoin Mikey from using this logo. Will Nike be successful?
a. Yes, because no logo can ever be similar to the logo of another company.
b. Yes, if the court determines that the two "swooshes" are confusingly similar.
c. No, unless it's impossible for a reasonable person to tell the two "swoosh"es apart.
d. No, because competition is a necessary component of capitalism and thus must be encouraged.
6. If you write an original story, what type of intellectual property gives you the right to decide who can make and sell copies of your
work?
a. Copyrights b. Designs c. Patents d. Trademarks
7. Imagine a sports team sets up a company to sell its own range of clothes. What type of intellectual property can the team use
to show that the clothes are made by them?
a. Copyrights b. Designs c. Patents d. Trademarks
8. It is the global forum for intellectual property services, policy, information and cooperation.
a. United Nation Organization c. World Intellectual Property Organization
b. Intellectual Property Organization d. Copyright, Patent, and Trademark Organization
9. How long is the validity period of a copyrighted photographic works?
a. 20 years after publication c. 50 years after publication
b. 25 years after creation of work d. lifetime of the author plus 50 years after death.
10. This symbol can generally be used by any person or business to indicate that a particular word, phrase or logo is intended to
serve as an identifier for the source of that product or service.
a. ™ b. ® c. © d. ∞
11. Fair use means you can use copyrighted materials without a license only for certain purposes. These reasons include all choices
except:
a. Cheating c. Researching
b. Reporting d. Teaching
12. Gary Alnas is about to finish his book, and Mr. Chester Sardual is ready to distribute copies of his new album. They are very
confident in the protection provided by the government for original works of authorship. What form of protection are they referring
to?
a. Copyright b. Patent c. Royalty d. Solitary
13. If you paint a mural on a classroom wall as an assignment for your art class, who owns the copyright?
a. Parents because you are too young to own a copyright.
b. You do because you are the "author" of the work.
c. Art teacher because she assigned the art project.
d. The school because it owns the wall.
14. Which of the following is not a type of intellectual property?
a. Copyright b. Patent c. Plagiarism d. Trademark
15. Evaluate the following pictures. Which is an example/s of trademark?
I. II.
a. I only c. both I and II
b. II only d. None of the above
16. Borrowing someone else's ideas or words, but failing to properly document the original source is called:
a. editing. c. plagiarism.
b. paraphrasing. d. writer’s block.
17. You are guilty of plagiarism if you:
a. Make use of the works of others to gather information.
b. Use the work of another and misrepresent it as your own.
c. Make use of the works of others to support your own arguments.
d. Examine the ideas and arguments of others to help you shape your own thoughts or views on a particular issue
18. Paraphrasing too closely to the original text even if you credit the source, is still considered as plagiarism because:
a. By not providing the exact words of the author in their entirety, you are attributing to the author some words that he/she
did not write.
b. You have failed to indicate, by means of direct quotation marks, which are the exact words of the original.
c. Changing a few words or the order of the original words, you have changed the author's exact words.
d. You must never use the words of others when you are using their ideas.
19. You are the adviser of Mr. Salcedo and you found out that the first paragraph of his paper is from Wikipedia, the second from
National Geographic, and the third paragraph is from Encyclopedia Britannica, but he changed a few words around to make it
flow. What type of plagiarism did he practice?
a. Ghost writer c. Photocopy
b. Misinformer d. Potluck paper
20. Taking a paper, you wrote last/month/week and using the same wording and idea for a current assignment.
a. Misinformer c. Self-stealer
b. Potluck paper d. Too-perfect paraphrase
21. Most of your paragraphs are paraphrased example, plot, or ideas from a source instead of your own ideas.
a. Ghost writer c. Perfect crime
b. Labor of laziness d. Self-stealer
22. The writer properly cites all sources, paraphrasing and using quotations appropriately. The paper contains almost no original
work. It is sometimes difficult to spot this form of plagiarism because it looks like any other well-researched document.
a. Ghost writer c. Perfect crime
b. Labor of laziness d. Resourceful citer
23. Information provided in your essay must be referenced in all the following cases except when the information ___________.
a. involves an interpretation peculiar to the author from whose work you are drawing.
b. describes common knowledge.
c. comes from an e-mail or phone call.
d. that you are recording is disputed within the discipline.
24. Although the writer has retained the essential content of the source, he or she has altered the paper’s appearance slightly by
changing key words and phrases.
a. Ghost writer c. Potluck paper
b. Poor disguise d. Too-perfect paraphrase
25. Which of the following is the best advice for avoiding plagiarism?
a. If relying on the work of multiple sources within a single paragraph, just list all the citations at the end of the paragraph.
b. Ask your friends and peers to help you generate the ideas and information for your paper.
c. Make sure that you quote everything from the original source, word-for-word, and cite.
d. Make sure that the source of every idea is clearly identified and cited.
26. Below is an excerpt from the article: Bennett, R. (2005). Factors associated with student plagiarism in a post-1992
university. Assessment & Evaluation in Higher Education, 30, 137-162.
“There is a need for university staff to address forcefully the issue of academic integrity during introductory programs and to
explain clearly and sympathetically the objective need for honesty in academic life” (p. 156).
Which of the following examples correctly paraphrases the above passage (without plagiarizing)?
a. There is a need for university staff to address forcefully the issue of academic integrity during introductory programs
and to explain clearly and sympathetically the objective need for honesty in academic life (p. 156).
b. There is a need for university staff to address forcefully the issue of academic integrity during introductory programs
and to explain clearly and sympathetically the objective need for honesty in academic life (Bennett, 2005).
c. There is a need for colleges to forcefully address the issue of academic integrity during beginning programs and to
explain clearly and sympathetically the objective need for integrity in college life (Bennett, 2005).
d. During orientations, university staff should be very clear about the importance of academic integrity (Bennett, 2005).
27. How would you correctly cite the following article the second time that it is cited within the text of a paper? Nzinga-Johnson, S.,
Baker, J. A., & Aupperlee, J. (2009). Teacher-parent relationships and school involvement among racially and educationally
diverse parents of kindergartners. Elementary School Journal, 110, 81-91.
a. Nzinga-Johnson, Baker, and Aupperlee (pp. 81-89)
b. Nzinga-Johnson, Baker, and Aupperlee (2009)
c. Nzinga-Johnson et al. (2009)
d. Nzinga-Johnson (2009)
28. Which of the following is the best way to protect yourself against plagiarism?
a. Always cite your sources.
b. Paraphrase other people’s information and cite the source of that information.
c. Include your own contributions, so you are not relying exclusively on the ideas of others.
d. All of the above are required in order to protect yourself against plagiarism.
For items 29-32. Read each scenario below and evaluate what issue can be found in every situation. Choose from the options
below.
a. Computer addiction c. Digital Divide
b. Cyberbullying d. Plagiarism
29. A graduate student at the country's premier state university submitted a photograph as his own and won a contest sponsored
by the Chilean ambassador. The photograph was copyrighted by the Children at Risk Foundation.
30. Carabuena was caught on video harassing the MMDA. The Video was posted, and netizens were very angry about it that they
commented harsh words on Mr. Carabuena.
31. According to Laura Clark (2014), an Education Correspondent, young people are increasingly displaying signs of compulsion to
use their tablets and smartphones, including taking their devices to bed, and in some cases, even preferring the company of
gadgets to people.
32. The Association of Filipino Franchisers, Inc. (AFFI) appealed to Telecommunication Operators (TELCOS) a Small-Medium
Enterprises (SME)-friendly connectivity for a faster economic growth.
33. Which one option is not a type of cybercrime?
a. Data theft c. Damage to data and systems
b. Child pornography d. Installing antivirus for protection
34. What is the ineptitude to control you hanker is using digital-age technology like computers and smartphones?
a. Cyberbullying c. Fair Use
b. Digital divide d. Virtual self
35. A high school student deliberately exposed embarrassing pictures of his classmate during their swimming party on Facebook.
This is an act of _______.
a. Cyberbullying c. Disrespect
b. Derision d. Misdemeanor
36. Which of the following is the most common type of cybercrime committed across the world?
a. Cyber stalking c. Hacking
b. E-mail spoofing d. Virus dissemination
37. It is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a
legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and
credit card details, and passwords.
a. Email-spoofing c. Phishing
b. Hacking d. Virus dissemination
38. Today there are many cases of cyberbullying, especially among young people. What is the best advice to avoid being a victim
of cyberbullying?
a. If you went to a computer shop or borrow a personal computer from your friend, be sure you sign out your account after
using.
b. Do not tell and share your password to other people, except your boyfriend/girlfriend.
c. Don’t use social media like Facebook.
d. a and b only
39. Suppose you have been victimized by cyberbullying. What is the best way you can do it?
a. Fight back by doing the same what he/she did, and you will post at social media that you are a victim.
b. Find a person that you trust and seek for help.
c. Keep quiet so that no one will know.
d. All of the above
40. The most common places where cyberbullying occurs are, except:
a. Instant Message c. Short Message Service
b. School d. Social Media
41. These are symptoms of a person experiencing computer addiction except one.
a. anxiety and distress c. defensive and dishonesty
b. sleep disorder and backpain d. social acceptance and compulsion
42. It refers to the act of harassing other people using technology like computer, laptop, or cellphone.
a. Bullying c. Cyber relationship
b. Compulsion d. Cyberbullying
Read each scenario below and identify if the situation manifests good or bad netiquette. Choose from the options below.
a. Only Statement I is good c. Only Statement II is good
b. Both Statements are good d. Both Statements are bad
43. I. Tina had a small disagreement on Facebook with her friend about a certain political issue. She noticed that her friend started
to get personal with her responses. Instead for responding with anger, Tina told her friend that they could just agree to disagree.
II. David is an Internet expert. He reads a question from a newcomer in an online discussion group. For him the answer is easy,
but the "newbie" is having trouble. He responds, "Hey newbie! Can't you read a book? Don't ask such a dumb question!"
44. I. Andrew’s laptop got broken so he borrowed his classmates for an assignment he had for school. As he opened the Internet
browser, his classmate apparently left his Facebook messenger open. Curious, Andrew browsed through his classmate’s
messenger.
II. Aubrey noticed a factual error on her Facebook friend’s post. Instead of shaming or mocking her, she privately messaged her
friend and politely told her that her post has an error and that she should correct it.
45. The following statements are reasons why digital divide exist except one.
a. has a strong motivation to learn how use the technology.
b. refuses to have knowledge of the advance technology.
c. has less information about the benefits of technology.
d. cannot afford to access the technology.
46. It is a trail of data you create while using the internet and in includes the websites you visit, emails you send, and information
you submit to online services.
a. Digital footprints c. Internet log
b. Data collection d. Lesson plan
For items 47-48. Read each statement below and identify the opportunities, challenges, and power of media described in each
number.
a. Banks of the future c. Identity theft
b. Education d. Social
47. Learners, teachers, and researchers make meaning of events from both individual and multiple points of viewing.
48. Media of today is playing an outstanding role in creating and shaping of public opinion and strengthening of society.
49. Which of the following is the disadvantages of social media for society?
a. Helps Gov’t and agencies fight crime c. Improves business reputation
b. Glamorizes Drugs and Alcohol d. Helps in building communities
50. One of the challenges of technology in the Education sector is _________.
a. improves engagement c. incorporates different learning styles
b. delivering informal learning d. encourages collaboration
Prepared by: Checked by:
GEORGE S. CALZADA MILDRED C. ALMAZAN
Subject Teacher School Principal I